agree - I'd like to get a better list about metadata, what is needed, how to 
handle it etc … 


On Nov 4, 2013, at 1:20 PM, Dean Willis <[email protected]> wrote:

> One thing you don't elaborate is reduction of the metadata attack surface by 
> reducing the amount of exposed metadata. In a messaging model, the only thing 
> that needs to be exposed "to the cloud" is the destination locator, and 
> possibly a random-ish (perhaps a hash of the content) message tag. See the 
> Crowcroft SNA idea previously referenced on this list.
> 
> Note that one can certainly envision an onion-routing model here that could 
> further obfuscate peer linkages "within the cloud". Especially with 
> randomized timing.
> On Oct 20, 2013 5:57 PM, "Cullen Jennings" <[email protected]> wrote:
> 
> I've been thinking about how to build cloud collaborations systems where the 
> data is encrypted and the cloud does not have the keys. Very interested in 
> hearing others thoughts on how to do this.
> 
> Near the end is a list of things that it would be helpful if the IETF 
> standardized.
> 
> http://www.ietf.org/id/draft-jennings-perpass-secure-rai-cloud-00.pdf
> 
> Cullen
> 
> _______________________________________________
> perpass mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/perpass

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to